메뉴 건너뛰기




Volumn 69, Issue 3, 2012, Pages 1149-1157

Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol

Author keywords

Anonymity; Chaotic maps; Key agreement protocol; Mutual authentication

Indexed keywords

ANONYMITY; CHAOTIC MAP; DENIAL OF SERVICE ATTACKS; INSIDER ATTACK; KEY AGREEMENT PROTOCOL; MUTUAL AUTHENTICATION; USER ANONYMITY; VARIOUS ATTACKS;

EID: 84863989374     PISSN: 0924090X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11071-012-0335-0     Document Type: Article
Times cited : (114)

References (25)
  • 2
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3D chaotic cat maps
    • Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749-761 (2004)
    • (2004) Chaos Solitons Fractals , vol.21 , Issue.3 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.3
  • 3
    • 78049452836 scopus 로고    scopus 로고
    • A chaotic image encryption algorithm based on perceptron model
    • Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615-621 (2010)
    • (2010) Nonlinear Dyn. , vol.62 , pp. 615-621
    • Wang, X.1    Yang, L.2    Liu, R.3
  • 4
    • 79952007772 scopus 로고    scopus 로고
    • Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    • Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587-597 (2011)
    • (2011) Nonlinear Dyn. , vol.63 , pp. 587-597
    • Wang, X.1    Wang, X.2    Zhao, J.3
  • 5
    • 79959528048 scopus 로고    scopus 로고
    • A speech encryption using fractional chaotic systems
    • Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103-108 (2011)
    • (2011) Nonlinear Dyn. , vol.65 , pp. 103-108
    • Jye, S.1
  • 7
    • 33747348397 scopus 로고    scopus 로고
    • An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
    • DOI 10.1016/j.chaos.2005.10.022, PII S0960077905009604
    • Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571-579 (2007) (Pubitemid 44247626)
    • (2007) Chaos, Solitons and Fractals , vol.31 , Issue.3 , pp. 571-579
    • Chen, G.1    Chen, Y.2    Liao, X.3
  • 8
    • 77949485060 scopus 로고    scopus 로고
    • A chaos-based hash function with both modification detection and localization capabilities
    • Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254-2261 (2010)
    • (2010) Commun. Nonlinear Sci. Numer. Simul. , vol.15 , Issue.9 , pp. 2254-2261
    • Xiao, D.1    Shih, F.2    Liao, X.3
  • 9
    • 70449124689 scopus 로고    scopus 로고
    • Analysis and improvement of a chaos-based Hash function construction
    • Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based Hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 1338-1347 (2010)
    • (2010) Commun. Nonlinear Sci. Numer. Simul. , vol.15 , Issue.5 , pp. 1338-1347
    • Deng, S.1    Li, Y.2    Xiao, D.3
  • 10
    • 9644303109 scopus 로고    scopus 로고
    • One-way hash function construction based on the chaotic map with changeableparameter
    • Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on the chaotic map with changeableparameter. Chaos Solitons Fractals 24(1), 65-71 (2005)
    • (2005) Chaos Solitons Fractals , vol.24 , Issue.1 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 11
    • 33751227507 scopus 로고    scopus 로고
    • A novel key agreement protocol based on chaotic maps
    • DOI 10.1016/j.ins.2006.07.026, PII S0020025506002246
    • Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136-1142 (2007) (Pubitemid 44791324)
    • (2007) Information Sciences , vol.177 , Issue.4 , pp. 1136-1142
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 12
    • 43049150816 scopus 로고    scopus 로고
    • Security of a key agreement protocol based on chaotic maps
    • DOI 10.1016/j.chaos.2007.01.017, PII S0960077907000343
    • Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764-768 (2008) (Pubitemid 351633025)
    • (2008) Chaos, Solitons and Fractals , vol.38 , Issue.3 , pp. 764-768
    • Han, S.1
  • 13
    • 64949092681 scopus 로고    scopus 로고
    • On the security of a novel key agreement protocol based on chaotic maps
    • Xiang, T., Wong, K., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672-675 (2009)
    • (2009) Chaos Solitons Fractals , vol.40 , Issue.2 , pp. 672-675
    • Xiang, T.1    Wong, K.2    Liao, X.3
  • 14
    • 70449471727 scopus 로고    scopus 로고
    • A chaotic maps-based key agreement protocol that preserves user anonymity
    • Dresden, Germany
    • Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC'09, Dresden, Germany, pp. 1-6 (2009)
    • (2009) IEEE International Conference on Communications, ICC'09 , pp. 1-6
    • Tseng, H.1    Jan, R.2    Yang, W.3
  • 15
    • 78049382801 scopus 로고    scopus 로고
    • An anonymous key agreement protocol based on chaotic maps
    • Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986-1992 (2011)
    • (2011) Commun. Nonlinear Sci. Numer. Simul. , vol.16 , Issue.4 , pp. 1986-1992
    • Niu, Y.1    Wang, X.2
  • 16
    • 84861748201 scopus 로고    scopus 로고
    • An extended chaotic maps-based key agreement protocol with user anonymity
    • doi:10.1007/s11071-011-0247-4
    • Lee, C., Chen, C., Wu, C., Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. (2011). doi:10.1007/s11071-011-0247-4
    • (2011) Nonlinear Dyn.
    • Lee, C.1    Chen, C.2    Wu, C.3    Huang, S.4
  • 17
    • 40249103088 scopus 로고    scopus 로고
    • Cryptanalysis of the public key encryption based on multiple chaotic systems
    • DOI 10.1016/j.chaos.2006.09.047, PII S096007790600909X
    • Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669-674 (2008) (Pubitemid 351335355)
    • (2008) Chaos, Solitons and Fractals , vol.37 , Issue.3 , pp. 669-674
    • Zhang, L.1
  • 18
    • 84855196010 scopus 로고    scopus 로고
    • Note on Design of improved password authentication and update scheme based on elliptic curve cryptography
    • He, H.,Wu, S., Chen, J.: Note on Design of improved password authentication and update scheme based on elliptic curve cryptography.Math. Comput. Model. 55(3-4), 1661-1664 (2012)
    • (2012) Math. Comput. Model. , vol.55 , Issue.3-4 , pp. 1661-1664
    • He, H.1    Wu, S.2    Chen, J.3
  • 19
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Guildford, UK
    • Linnartz, J., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Audio-And Video-Based Person Authentication, Guildford, UK, pp. 393-402 (2003)
    • (2003) Proceedings of the Audio-And Video-Based Person Authentication , pp. 393-402
    • Linnartz, J.1    Tuyls, P.2
  • 21
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T., Dabbish, E., Sloan, R.: Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541-552 (2002) (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 22
    • 69949114528 scopus 로고    scopus 로고
    • Theoretical framework for constructing matching algorithms in biometric authentication systems
    • Alghero, Italy. Lecture Notes in Computer Science. Springer, Berlin
    • Inuma, M., Otsuka, A., Imai, H.: Theoretical framework for constructing matching algorithms in biometric authentication systems. In: Proc. of ICB'09, Alghero, Italy. Lecture Notes in Computer Science, vol. 5558, pp. 806-815. Springer, Berlin (2009)
    • (2009) Proc. of ICB'09 , vol.5558 , pp. 806-815
    • Inuma, M.1    Otsuka, A.2    Imai, H.3
  • 23
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • doi:10.1007/s10916-011-9658-5
    • He, D., Chen, J., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. (2010). doi:10.1007/s10916-011-9658-5
    • (2010) J. Med. Syst.
    • He, D.1    Chen, J.2    Zhang, R.3
  • 24
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • doi:10.1002/sec.506
    • He, D., Chen, J., Chen, Y.: A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. (2011). doi:10.1002/sec.506
    • (2011) Secur. Commun. Netw.
    • He, D.1    Chen, J.2    Chen, Y.3
  • 25
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
    • doi:10.1016/j.adhoc. 2012.01.002
    • He, D.: An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Netw. (2012). doi:10.1016/j.adhoc. 2012.01.002
    • (2012) Ad Hoc Netw.
    • He, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.